Ex Parte Bleizeffer et al - Page 6



             Appeal No. 2006-2354                                                  Page 6                     
             Application No. 09/877,157                                                                          
                   2. In particular, we find that Moriconi describes a process for creating                      
                          and customizing rules to manage a security policy from a centralized                   
                          server in a distributed computer network.  Moriconi, col. 3, lines 50-                 
                          54 and 57-63 and col. 4, lines 19-22.                                                  
                   3. Moriconi discloses that an administrator can use a policy manager to                       
                          create a global policy that specifies access privileges of the user to                 
                          securable components of the network.  Moriconi, col. 4, lines 25-26.                   
                   4. The policy manager allows privileges to be grouped together and                            
                          granted to a role.                                                                     
                   5. Moriconi teaches, “Roles are named groups of privileges that are                           
                          granted to users or other roles.”  Moriconi, col. 7, lines 55-56.                      
                   6. “A role is often used to represent the set of privileges needed to                         
                          perform a job function.”  Moriconi, col. 7, lines 57-58.                               
                   7. Moriconi discloses that the administrator may add global roles (912)                       
                          and local roles (916) on a server or client using the policy manager                   
                          (210), thereby teaching that the administrator can create policy                       
                          groups.  Moriconi, col. 12, lines 35-39, see also col. 12, lines 55-61.                
                   8. In this case, the data elements in Moriconi are the individual                             
                          privileges and the data elements (privileges) are combined into a                      
                          named group (based on a role), which has been defined by the                           
                          administrator creating the security policy, and the security policy is                 
                          then generated based on these groups (by assigning the privileges                      
                          associated with that role to the designated user(s)).                                  







Page:  Previous  1  2  3  4  5  6  7  8  9  10  11  12  13  14  15  Next 

Last modified: November 3, 2007